Vulnerability Details : CVE-2017-16086
Public exploit exists!
ua-parser is a port of Browserscope's user agent parser. ua-parser is vulnerable to a ReDoS (Regular Expression Denial of Service) attack when given a specially crafted UserAgent header.
Vulnerability category: Denial of service
Products affected by CVE-2017-16086
- cpe:2.3:a:ua-parser_project:ua-parser:*:*:*:*:*:node.js:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-16086
0.91%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2017-16086
-
ua-parser-js npm module ReDoS
First seen: 2020-04-26auxiliary/dos/http/ua_parser_js_redosThis module exploits a Regular Expression Denial of Service vulnerability in the npm module "ua-parser-js". Server-side applications that use "ua-parser-js" for parsing the browser user-agent string will be vulnerable if they call the "getOS" or "getResult" functions
CVSS scores for CVE-2017-16086
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2017-16086
-
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.Assigned by:
- nvd@nist.gov (Primary)
- support@hackerone.com (Secondary)
References for CVE-2017-16086
-
https://nodesecurity.io/advisories/316
npmThird Party Advisory
Jump to